Summary

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions:

Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.188.

Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.289.

Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.460.

Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.188.

Users of the Adobe AIR desktop runtime should update to version 17.0.0.172.

Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 17.0.0.172.

Affected software versions

Adobe Flash Player 17.0.0.169 and earlier versions

Adobe Flash Player 13.0.0.281 and earlier 13.x versions

Adobe Flash Player 11.2.202.457 and earlier 11.x versions

AIR Desktop Runtime 17.0.0.144 and earlier versions

AIR SDK and SDK & Compiler 17.0.0.144 and earlier versions

To verify the version of Adobe Flash Player installed on your system, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.

To verify the version of Adobe AIR installed on your system, follow the instructions in the Adobe AIR TechNote.

Solution

Adobe recommends users update their software installations by following the instructions below:

Adobe recommends users of the Adobe Flash Player desktop runtime for Windows and Macintosh update to Adobe Flash Player 17.0.0.188 by visiting the Adobe Flash Player Download Center, or via the update mechanism within the product when prompted.

Details

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. Adobe recommends users update their product installations to the latest versions:

Users of the Adobe Flash Player desktop runtime for Windows and Macintosh should update to Adobe Flash Player 17.0.0.188.

Users of the Adobe Flash Player Extended Support Release should update to Adobe Flash Player 13.0.0.289.

Users of Adobe Flash Player for Linux should update to Adobe Flash Player 11.2.202.460.

Adobe Flash Player installed with Google Chrome, as well as Internet Explorer on Windows 8.x, will automatically update to version 17.0.0.188.

Users of the Adobe AIR desktop runtime should update to version 17.0.0.172.

Users of the Adobe AIR SDK and AIR SDK & Compiler should update to version 17.0.0.172.

These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-3078, CVE-2015-3089, CVE-2015-3090, CVE-2015-3093).

These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2015-3088).

These updates resolve a time-of-check time-of-use (TOCTOU) race condition that could be exploited to bypass Protected Mode in Internet Explorer (CVE-2015-3081).

These updates resolve validation bypass issues that could be exploited to write arbitrary data to the file system under user permissions (CVE-2015-3082, CVE-2015-3083, CVE-2015-3085).

These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-3087).

These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-3077, CVE-2015-3084, CVE-2015-3086).

These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2015-3080).

These updates resolve memory leak vulnerabilities that could be used to bypass ASLR (CVE-2015-3091, CVE-2015-3092).

These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2015-3079), and provide additional hardening to protect against CVE-2015-3044.